Phishtank - the conventional tank of phishes

Phishtank is a project by OpenDNS community. OpenDNS is a company which provides its services for safe and fast browsing to the Internet. While Phishtank is a community where anyone can share or check phishing data. Phishtank is not a technology to filter phishing/spam or to protect against phishing attacks, but a platform to submit, verify, check or share phishing details so it provides as a repository of phishing data. How to support Phishtank? You can support Phishtank in either ways: ...

2013-Sep-19 Â· 2 min

Brute-Force Attack on Wordpress

Apparatus: Distributed botnet, around tens of thousands of bots with their respective IP addresses A pass file of around 1000 entries with some normal passwords Default username: ‘admin’ Steps: WordPress 3.0 release before 3 years, users going on with ‘admin’ as their default username, and some usual password A brute-force with username: ‘admin’ and password from the above mentioned file The botnet, tries this attack on each and every wordpress portal available over Internet Objective: A well-planned distributed attack (just like itsoknoproblembro shook the banking world) against some hot-spot over the Internet. ...

2013-Apr-13 Â· 2 min

Why is it necessary to keep your email secure?

Apart from the normal reasons for keeping our email accounts secure, there are many more which we try to ignore, or are not aware of the possibilities. Take this scenario – why to keep the work-related and social email accounts seperate and confidential (if possible): If someone knows the basic information about you, your social networking account can be hacked. The main ingredient is – your email id. Its better to keep the id secure which you are using for networking. If the work and social email ids are the same, there are more chances of people guessing-knowing your basic informations, providing more chance for your account to get compromised. ...

2012-Dec-14 Â· 2 min

Common Network Security Threats

Smurf It’s a version of Denial of Service attack – floods the victim with spoofed broadcast pings. A large number of pings are sent to the IP broadcast address of the victim, it responds back with broadcast to all the hosts – and these hosts simultaneously reply – causing a major lock in the network. Ping of Death A funny ping – ICMP packet is sent to the victim – which floods its buffer, causing the system to reboot or the network getting hanged. ...

2012-Sep-05 Â· 2 min